Warning: AI-generated YouTube Video Tutorials Spreading Infostealer Malware

0
Mar 13, 2023Ravie LakshmananCyber Threat / Social Engineering Threat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer...

GitHub Announces Free Secret Scanning for All Public Repositories

0
Dec 16, 2022Ravie LakshmananSecure Coding / Code Hosting GitHub on Thursday said it is making available its secret scanning service to all public repositories...

Accelerate Your Incident Response

0
Dec 23, 2022The Hacker NewsIncident Response / XDR Platform Tis the season for security and IT teams to send out that company-wide email: "No,...

CISA’s KEV Catalog Updated with 3 New Flaws Threatening IT Management Systems

0
Mar 08, 2023Ravie LakshmananVulnerability / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited...

Mitigate the LastPass Attack Surface in Your Environment with this Free Tool

0
Jan 05, 2023The Hacker NewsPassword Management / IT Breach The latest breach announced by LastPass is a major cause for concern to security stakeholders....

Hackers Inject Weaponized JavaScript (JS) on 51,000 Websites

0
Researchers from Unit 42 have been monitoring a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect unsuspecting victims to dangerous...

YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader

0
Apr 18, 2023Ravie LakshmananThreat Intelligence / Cyber Risk Cybersecurity researchers have detailed the inner workings of a highly evasive loader named "in2al5d p3in4er" (read:...

Malicious PyPI Packages Using Cloudflare Tunnels to Sneak Through Firewalls

0
Jan 09, 2023Ravie LakshmananNetwork Security / Supply Chain In yet another campaign targeting the Python Package Index (PyPI) repository, six malicious packages have been...

Pay What You Want for This Collection of White Hat Hacking Courses

0
Whether you relish a mental challenge or fancy a six-figure paycheck, there are many good reasons to get into white hat hacking. That said,...

Cyolo Product Overview: Secure Remote Access to All Environments

0
Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations' essential systems and resources. Cybercriminals no longer break into systems,...